Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions

Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have proposed utilizing parallel computing to speed up th...

Full description

Bibliographic Details
Published in:Applied Sciences
Main Authors: Mark Vainer, Arnas Kačeniauskas, Nikolaj Goranin
Format: Article
Language:English
Published: MDPI AG 2025-07-01
Subjects:
Online Access:https://www.mdpi.com/2076-3417/15/15/8152